Phi.sh/$oCiaL: The Phishing Landscape through Short URLs Sidharth Chhabra *, Anupama Aggarwal †, Fabricio Benevenuto ‡, Ponnurangam Kumaraguru † * Delhi.

Slides:



Advertisements
Similar presentations
PhishZoo: Detecting Phishing Websites By Looking at Them
Advertisements

We’re Going ! Collaboration in the Cloud: Science Birdville ISD Instructional Technology.
A platform of for knowledge and services sharing Fernando Ferri IRPPS-CNR.
{ Trends in Social Network M. Tech Project Presentation By : Pranay Agarwal 2008CS50220 Guides : Amitabha Bagchi Maya Ramanath.
The Role of Twitter in YouTube Videos Diffusion George Christodoulou EPFL Switzerland Laboratory for Internet Computing Department of Computer Science.
Design and Evaluation of a Real-Time URL Spam Filtering Service
Report by: Bloggers Media Limited Data Source: Digital Rand Presented by: Robert Kunga STATE OF SOCIAL MEDIA IN KENYA Tumetoka Mbali Report No. A002.
Is Social Media right for you? by Social Media Travelers
30 Tips in 30 Minutes Marketing Your Event on Social Media.
Social network analysis of the West African Ebola Outbreak INTRODUCTION The Ebola outbreak in West Africa has drawn the World’s attention given the spread.
Cloak and Dagger. In a nutshell… Cloaking Cloaking in search engines Search engines’ response to cloaking Lifetime of cloaked search results Cloaked pages.
Identifying Best Practices for Social Media Work Kamaria Campbell, Usability Auditor, ForeSee State of Michigan World Usability Day November 10, 2011.
Creativity Design and Cognition Gopal Kaushik – Rohit Sureka.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
PageRank Identifying key users in social networks Student : Ivan Todorović, 3231/2014 Mentor : Prof. Dr Veljko Milutinović.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
Dark Nebula: Using the Cloud to build a RESTful Web Service John Fisher, Robert Fisher, and Peter Bui Department of Computer Science With the emerging.
THREE ESSENTIAL FOCUSES IN MOBILE MARKETING By Eric Koeck Center website:
Social Media Marketing Plan By D.U.E.S. (Tony, Sara, Shannon, MaryAnn)
Presented by Karen Porter UM School of Business Administration & ImpactOnlineMarketing.com Google + and Twitter for Biz ImpactOnlineMarketing.com.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
PhishScore: Hacking Phishers’ Minds
Social Media for Credit Unions? Facebook – Getting Started Adding content Promoting Advertising Summary W E L O O K A T T H I N G S D I F F E R E N T.
John P., Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy University of California, Santa Cruz USENIX SECURITY SYMPOSIUM, August, 2010 John P.,
Online Marketing & Social Media for Voluntary Organisations Mike Hughes Microsoft Ireland
Suspended Accounts in Retrospect: An Analysis of Twitter Spam Kurt Thomas, Chris Grier, Vern Paxson, Dawn Song University of California, Berkeley International.
A Geographical Characterization of YouTube: a Latin American View Fernando Duarte, Fabrício Benevenuto, Virgílio Almeida, Jussara Almeida Federal University.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Wei-Li Liu. + Goal: a. Do research on the history of social networking b. Compare the features of some of the past popular social networking sites c.
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
Disaster Video Gallery ZeleAlem. Disaster Video Gallery Project Motivation Information (Video) about past disasters are everywhere on the internet But.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Microblogs: Information and Social Network Huang Yuxin.
CCT355H5 F Presentation: Phishing November Jennifer Li.
1 General Meeting - Carvoeiro January 2008 EDIT WP8 Training resources in Europe and the School of Taxonomy Jackie Van Goethem.
Online Marketing Strategy Zoe Behan & April Brophy 15/10/2013.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Videos and Social Media Work Together. Social media and videos are two of the most powerful outlets that companies have online for gaining new business.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
The Tube Over Time: Characterizing Popularity Growth of YouTube Videos ` Abstract In this work, we characterize the growth patterns of video popularity.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
The Koobface Botnet and the Rise of Social Malware Kurt Thomas David M. Nicol
We.b : The web of short URLs Demetris Antoniades, lasonas Polakis, Gerogios Kontaxis, Elias Athansapoulos, Sotiris loannidis, Evangelos P.Markatos, Thomas.
Detecting and Characterizing Social Spam Campaigns Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ.
 Definition of Social Media - forms of electronic communication (as Web sites for social networking and microblogging) through which users create online.
Real Name Verification Law on the Internet: A Poison or Cure for Privacy? Daegon Cho Heinz College, Carnegie Mellon University June 15th WEIS 2011 at George.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Evaluating Event Credibility on Twitter Presented by Yanan Xie College of Computer Science, Zhejiang University 2012.
Get the Word Out: Using Facebook and Twitter for Outreach and Community Building Cliff Landis Web Services Librarian Georgia State University.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
Alvin CHAN Kay CHEUNG Alex YING Relationship between Twitter Events and Real-life.
Personal Branding. Objectives How do you see yourself? How do others see you? What is your personal brand?
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Raising Funds Through Your Website November 12, 2013.
Solving the Twitter Home Feed Noise Problem by Qweboo Qweboo – A better way to keep up to date with your interests on Twitter.
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks Jenny (Bom Yi) Lee.
Gross Niv Analyzing Spammer’s Social Networks for Fun and Profit
Uncovering Social Spammers: Social Honeypots + Machine Learning
Online Social Network: Threats &
Automated Experiments on Ad Privacy Settings
Market Intelligence Analysis
Website URL
ورود اطلاعات بصورت غيربرخط
How Search Engines Work?
BACKGROUND & MOTIVATION
Austin Karingada, Jacob Handy, Adviser : Dr
Presentation transcript:

Phi.sh/$oCiaL: The Phishing Landscape through Short URLs Sidharth Chhabra *, Anupama Aggarwal †, Fabricio Benevenuto ‡, Ponnurangam Kumaraguru † * Delhi College of Engineering, † IIIT-Delhi, † Federal University of Ouro Preto

2 Motivation

3

4

5 Phishing via Short URLs

6 Most popular - June January 2011 * Most abused URL shortener 23.48% of short URL services

7 Research Aim

8 Analysis of Phishing Tweets containing Bitly How is Bitly used by Phishers? Who is Targeted ? Which Locations are Affected ?

9 System Architecture

10 Referral Analysis UR L Time Is a Phish Is Up Phishing URLs Short URLs Long URL Short URL Created by Lookup API Brand Analysis Temporal Analysis Geographical Analysis Behavioral Analysis Text Analysis Network Analysis Data Collection Filtering Analysis

11 Vote if Phishing YesNoUnknown Online Yes11, ,234 No1,02,1755,99168,731 Unknown4, January - 31 December, 2010 Dataset

12 Dataset 990 public Twitter users who posted phish tweets 864 user accounts present at the time of analysis 2000 past tweets for each of 516 users

13 Results

14 Space gain is fraction of space saved by using bit.ly For 50% URLs, Space Gain < 37%

15 Social Network Websites targeted

Twitter users 213 inorganic 303 organic 153 compromised 150 legitimate Phish activity is majorly automated

17 Sparse Network, High Reciprocity

18 Country was determined by using the Bit.ly statistics Brazil is most targeted followed by US and Canada

19 Limitations

20 Reliance on PhishTank 90% URLs offline when voted Small number of active voters

21 Conclusion

22 URLs shorteners used to hide identity Change in landscape of phishing - OSNs target Phishing activity is automated Lack of phishing communities Brazil had highest phish URL clickthrough

23 Future Work

24 Analyze the use of URL shorteners like goo.gl, tinyurl etc. Develop an algorithm to detect phishing on Twitter

25 Thank You !